An Overview of Anomaly Detection
暂无分享,去创建一个
Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can't address.
[1] Gregory S. Parnell,et al. Mission Oriented Risk and Design Analysis of Critical Information Systems , 2005 .
[2] Levente Buttyán,et al. Duqu: Analysis, Detection, and Lessons Learned , 2012 .
[3] Ahmed Patel,et al. A service-centric model for intrusion detection in next-generation networks , 2005, Comput. Stand. Interfaces.
[4] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..